To read this content please select one of the options below:

Improving protection mechanisms by understanding online risk

Shirley Atkinson (Information Security and Network Research Group, University of Plymouth, Plymouth, UK)
Chris Johnson (School of Computing, Communications & Electronics, University of Plymouth, Plymouth, UK)
Andy Phippen (School of Computing, Communications & Electronics, University of Plymouth, Plymouth, UK)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 16 October 2007

2104

Abstract

Purpose

The purpose of this research is to examine privacy risks for two groups of individuals for whom privacy is an important issue. Understanding the risks to vulnerable groups leads to the development of a prototype tool used to inform users about areas of potential harm in their online behaviour.

Design/methodology/approach

Data collection employed a number of qualitative approaches in order to best understand both the risks and the social context surrounding them. Semi‐structured interviews, focus groups and questionnaires were all utilised where appropriate. Subjects were selected from two groups of individuals for whom the abuse of personal information could lead to serious harm – teenagers and domestic abuse survivors.

Findings

The findings provide specific examples of risks posed to the two groups of individuals involved in the study and demonstrate the need for protection mechanisms that promote the awareness of potential risk among vulnerable internet users. These formed the basis of the requirements for the prototype.

Originality/value

This paper presents a contribution to the understanding of risks faced by individuals from technologies as well as considering the potential for harm in an online setting against traditional abuse theories. It also contributes to the body of knowledge considering the development of privacy‐enhancing technologies.

Keywords

Citation

Atkinson, S., Johnson, C. and Phippen, A. (2007), "Improving protection mechanisms by understanding online risk", Information Management & Computer Security, Vol. 15 No. 5, pp. 382-393. https://doi.org/10.1108/09685220710831125

Publisher

:

Emerald Group Publishing Limited

Copyright © 2007, Emerald Group Publishing Limited

Related articles